Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
141s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
15/11/2023, 05:46
Behavioral task
behavioral1
Sample
NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe
-
Size
310KB
-
MD5
ac31b3fb32daf878d07982b5ca8e4b20
-
SHA1
eecada0e6aa8ad9332ef9a2d9207f5fee0847071
-
SHA256
1ef8e5c6dc1a1cff1c321c41c3658171957726f334e989281af1916e2b4b1707
-
SHA512
320b4b1035de51e90fb8e430d5cafdc21cede5d3ccebb9c18dbe262940f90c9c81d1eda632c51da6519586fb2e6aefb21a10af55124365db75ae65ae73e64bf0
-
SSDEEP
6144:m7GfBcQhadAdQNLSNoSMuAfo3ySJ/xBSsKtB/H0CV1I4tiAyr:m7GfBcQodAdQQNoSMjybQPpH0d4kvr
Malware Config
Signatures
-
resource yara_rule behavioral2/memory/4460-0-0x0000000000400000-0x00000000004F1000-memory.dmp upx behavioral2/memory/4460-2-0x0000000000400000-0x00000000004F1000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 24 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Key created \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Key created \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Key created \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = 00000000ffffffff NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\MRUListEx = ffffffff NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f44471a0359723fa74489c55595fe6b30ee0000 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Key created \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Key created \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0 = 4e003100000000006f57d72d100054656d7000003a0009000400efbe57575c7a6f57d72d2e000000b1e1010000000100000000000000000000000000000033817300540065006d007000000014000000 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (int) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\0\NodeSlot = "1" NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (str) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Generic" NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 820074001c0043465346160031000000000057575c7a120041707044617461000000741a595e96dfd3488d671733bcee28bac5cdfadf9f6756418947c5c76bc0b67f400009000400efbe57575c7a6f57d92d2e0000009de1010000000100000000000000000000000000000079e9e7004100700070004400610074006100000042000000 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Key created \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0 = 50003100000000005757757d10004c6f63616c003c0009000400efbe57575c7a6f57d92d2e000000b0e101000000010000000000000000000000000000007b16cd004c006f00630061006c00000014000000 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\0\MRUListEx = 00000000ffffffff NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Key created \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Key created \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Key created \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe Set value (data) \REGISTRY\USER\S-1-5-21-2231940048-779848787-2990559741-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4460 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4460 wrote to memory of 440 4460 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe 84 PID 4460 wrote to memory of 440 4460 NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.ac31b3fb32daf878d07982b5ca8e4b20.exe"1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:440
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2408